Open breznak opened 7 years ago
As a good start, auditors shall refer to the "crypto heart" of this application and its threat model (look for the string mitiga
to find out how they mitigate described attack vectors; some vectors might be though missing... thus the security audit).
The library received a few internal security reviews. The threat model posted above is a summary of the design level findings.
For such sensitive app, it would be almost crucial to perform a security audit (once a semi-stable version is reached)